Hexis Blog

Check out our
Video Blog too!
Feb
04

MIT Technology Review recently published a fascinating interview with Greg Shannon, the assistant director for cybersecurity strategy for the Obama administration's Office of Science and Technology Policy.

Shannon's credentials include being chief scientist at Carnegie Mellon University's Software Engineering Institute. But enough of that. He's someone worth listening to. Let's examine some of the most interesting points he raised.

Lucrative rewards drive cybercrime...

Feb
04

The cybersecurity field has no shortage of challenges. But one of the most urgent and troubling is the labor crisis gripping the industry.

You may already be familiar with the stark numbers:

As many as 1 million cybersecurity jobs are unfilled worldwide, according to Cisco. By 2019, demand for workers may reach 6 million, with a shortfall of 1.5 million people, Symantec predicted. 9 out of 10 cybersecurity jobs advertised online do not result in hires, CareerBuilder...
Feb
03

Colorado's governor recently announced his state would create a "National Cybersecurity Intelligence Center." However, the details of what exactly this center would do remain vague.

Gov. John Hickenlooper, a Democrat, made the news a central point in his January "State of the State" speech.

"As we see it," Hickenlooper said in the address, "this center can be the country's foremost authority on cybersecurity research and development, training and education. It will...

Feb
02

Yesterday, FireEye acquired Invotas International Corporation. Invotas’ core solution, Security Orchestrator, began life as an incident response management platform. The focus was on helping organizations automate a manual incident response process. While a technology platform was critical, this also required a heavy dose of consulting services to deliver “playbooks” that would enable automated response.

(For in depth views on this area Gartner analyst Rob McMillan wrote an excellent...

Feb
02

This week’s Rewind focuses on ransomware, cyber insurance, and a sinking ship.

 

Ransomware Remains a Hot TopicOne of the most shocking 2016 cybersecurity predications I’ve seen was that ransomware would remain a major issue again this year. Actually just kidding on this being shocking! Ransomware was a big deal in 2015 and it makes sense that this type of threat will only intensify in 2016.

DarkReading’s Sara Peters recently wrote a great...

Jan
21

“How do you handle pass the hash attacks on NTLM or other non-salted hashing authentication protocols?” “How would you catch file-less malware attacks?” “Unknown variants?” “Arbitrary code execution?” “What about macro-malware campaigns which remain obfuscated even after payloads are downloaded?”

These are the kinds of questions an exhibitor must be prepared to answer during a session at a ShmooCon Conference, the sell-out hacker conference on the East Coast. It’s not for the faint of...

Jan
19

CBS' "60 Minutes" reports that Chinese cyberspies are still stealing U.S. business secrets on a massive scale. That's despite Beijing's agreement to stop any such activities aimed at commercial gain.

If the CBS report is accurate, ongoing intrusions by government-sponsored hackers in China could be costing the United States 2 million jobs and hundreds of billions of dollars.

"60 Minutes" interviewed the CEO of American Superconductor. He claims the Chinese "turned" one of the...

Jan
19

Business owners, listen up: It's past time to upgrade to a more secure browser.

A new survey shows that about a third of small businesses use Internet Explorer. That, in itself, is not the problem.

Manta Media reports that of business owners who use Microsoft's best-known browser, 6 out of 10 use Internet Explorer 10 or older. And that, indeed, is the problem.

Those expired versions are no longer being supported by Microsoft. That means inevitable security flaws, which...

Jan
19

Believe it or not, an inelegant hack that's been around for more than a decade is still a prime vulnerability for retailers.

Cross-site scripting, better known in cybersecurity circles as XSS, exploits flaws in Web-facing and cloud-based applications to access business and customer data.

Major online retailer warned of XSS flaw An XSS data breach was back in the news recently when an independent researcher discovered the website of e-commerce giant eBay had the...

Jan
13

The cybersecurity industry doesn't have its own national holiday. Yet.

But we do get to celebrate Data Privacy Day soon.

Organizers hope the day spurs consumers to "own" their online identities. Data Privacy Day also aims to educate organizations on why privacy is good for business. 

This year, Data Privacy Day falls on Thursday, Jan. 28. The 2016 theme is "Respecting Privacy, Safeguarding Data and Enabling Trust."

The National Cyber Security Alliance puts on the...

Pages

YES! SEEING IS BELIEVING.
Please sign me up for a personalized product demonstration to see it in action.
Subscribe to Hexis Blog

Offices

Corporate Headquarters
7740 Milestone Parkway
Suite 400
Hanover, MD 21076
Open in Google Maps

Silicon Valley
2800 Campus Drive
Suite 150
San Mateo, CA 94403
Phone: (650) 830-0484
Open in Google Maps

KeyW

EMEA Headquarters
107-111 Fleet Street
London
EC4A 2AB
United Kingdom
Phone: +44 (0)203 755 3584
Open in Google Maps

Hexis Development Center
9693 Gerwig Lane, Suite O
Columbia, MD 21046
Phone: (443) 766-1550
Open in Google Maps

Contact Information

Main Phone:  (443) 733-1900
Fax: (443) 733-1901
Email: info@hexiscyber.com

HexisCARE
Call: 443-733-1900
Email: support@hexiscyber.com

Customer Support Portal Login
Partner Login

 

Follow Us

Twitter icon
LinkedIn icon
SlideShare icon
YouTube icon

© 2016 - Hexis Cyber Solutions, a KEYW company | Site Map | Terms of Use & Privacy Policy | End User License   Back to Top

 

 

Back to Top